166
Voted
SADFE
15 years 6 months ago
2008 IEEE
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
120
click to vote
SADFE
15 years 6 months ago
2008 IEEE
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
95
Voted
SADFE
15 years 6 months ago
2008 IEEE
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
138
click to vote
IMF
15 years 1 months ago
2008
Abstract: In contrast to the USA and the UK, the academic field of forensic computing is still in its infancy in Germany. To foster the exchange of experiences, we report on lesson...
SADFE
15 years 6 months ago
2008 IEEE
To enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as Legal professional privilege (LPP) docume...
|